article thumbnail

Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

The Security Ledger

With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. Episode 215-1: Jeremy O’Sullivan of Kytch On The Tech Serving McDonald’s Ice Cream Monopoly Episode 218: Denial of Sustenance Attacks -The Cyber Risk To Agriculture.

article thumbnail

Sustainability trends: 5 issues to watch in 2024

IBM Big Data Hub

Investors, regulators and stakeholders are increasingly demanding that companies disclose their exposure to climate-related risks , such as dependence on fossil fuels or vulnerability to weather events. They’re also turning to a new perspective: “nature positive.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Special Media Catalog Updates

Unwritten Record

General Radio Programs Recordings Relating to Secretaries of Agriculture, 3/8/1941 – 1/19/1993 (NAID 100989, Local Identifier 16-GENERALa) (1483 new item descriptions, no audio files). Portfolio Series of Ship Engineering Drawings, 1908 – 1938 (NAID 559596). 702 file unit descriptions for each ship name). 1945 – ca.

article thumbnail

Connecting town and gown through the library

CILIP

Part of a Lancastrian slave-trading and plantation owning dynasty, Joshua sold cargoes of enslaved people landed by English slave ships in the West-Indies and was the manager on a sugar plantation in Grenada before he retired back to Lancaster and used some of his ill-gotten wealth to turn Bailrigg into a private agricultural estate.

article thumbnail

CISA issues proposed rules for cyber incident reporting in critical infrastructure

Data Protection Report

There are no sector-based criteria for the Commercial Facilities, Dams, or Food and Agriculture sectors, where the entities that would likely impact national security, economic security, or public safety are already identified by size. A covered entity makes a ransom payment after it has already filed a covered cyber incident report.